Communications of the ACM
Secret image sharing with steganography and authentication
Journal of Systems and Software
Improvements of image sharing with steganography and authentication
Journal of Systems and Software
Secret Image Sharing Using Quadratic Residues
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Threshold Secret Image Sharing by Chinese Remainder Theorem
APSCC '08 Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference
Reversible Secret Image Sharing Based on Shamir's Scheme
IIH-MSP '09 Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
Proceedings of the 1982 conference on Cryptography
Hi-index | 0.00 |
Secret image sharing is a technique to share a secret image among n participants using Shamir's secret sharing scheme. Secret image is revealed if any k of the n shares is processed according to the scheme. Research reported in the literature is focused on improving known issues of the method. Reconstruction without distortion, reducing the size expansion of the share images, improving stego image quality and enhancing authentication ability of the method are some of the issues. Recovering cover images after the revealing procedure is an important issue. In 2009, Wu et al. proposed a technique based on reversible steganography to solve this problem. A location map is used to recover cover images, which needs extra information. The proposed method outlined in this paper does not need any information except shares to recover cover images. In addition, visual quality of the shares or the peak signal to noise ratio (PSNR) values of stego images are improved which is used to demonstrate the effectiveness of the method. Experimental results indicate a 3 dB PSNR improvement on the average compared to Wu et al.'s method.